Search results for: cyber threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 953

Search results for: cyber threats

413 An Evaluation of the Effectiveness of Health and Safety Induction Practices in the Zambian Construction Industry

Authors: Josephine Mutwale-Ziko, Nonde Lushinga, Inonge Akakandelwa

Abstract:

The study discusses the effectiveness of health and safety induction practices on construction sites against the background of the Zambian construction industry experience. The research design included the literature review of relevant literature. Questionnaires and interviews were administered to regulatory bodies, health, and safety personnel. Observation was also employed on construction sites to assess the health and safety practices being used. Health and safety in the construction industry are not something to be ignored or overlooked. The construction industry needs to take heed of the serious consequences of inadequate health and safety induction practices. The implications of inadequate health and safety induction procedures included among others threats to profitability, corporate social responsibility and increased turnover of the workforce leading to poor productivity. Adequate health and safety practices can improve the health and wellbeing of employees, reduce financial implications on firms and encourage productivity on construction sites. Despite this, accidents are still prevalent on construction sites in Zambia. The overall result of this research denotes that the implementation of health and safety induction practices is inadequate, as indicated by the negligent and non-adherent attitude to health and safety induction aspects on the sites by most stakeholders on construction sites. Therefore, health and safety induction practices are ineffective as preventive measures for reduction of accidents on construction sites in Zambia.

Keywords: accidents, health and safety, inadequate, induction

Procedia PDF Downloads 448
412 Growing Acts of Terrorism in Local Conflicts: A Dire Need for International Attention

Authors: Yusuf Abubakar Mamud

Abstract:

Highlighting the imperatives of local conflicts considering the dangerous dimensions of terrorism they are assuming in Africa has not attracted serious academic and political attention. The discourse about conflict in Africa was discussed within five identified conflict zones in the continent. The threats from these local conflicts are diverse and complex and the acts of terrorism in these local conflicts are driven by certain attitudes and behaviours linked to the African leadership. The paper examined and noted that the current conflict resolution model of the African Union (AU) was robust with requisite institutions to address the trends in local conflicts. However, it was observed that the AU peace and security framework lacked the requisite structural and technical capabilities to proactively address the drivers of local conflicts in Africa. It was found that the persistence of local conflicts in the African region may deny her the opportunities of achievement of the targets envisioned in the Sustainable Development Goals (SDGs). Consequently, the paper called on the international community to support Africa through provision of capacity. It urged the African leaders themselves to develop the political will to ensure that all issues concerning peace and security in the continent were guided by the provisions of the AU Constitutive Act. The need to strengthen the APRM in the light of the current trends in local conflicts was also highlighted.

Keywords: conflicts, local conflicts, terrorism, sustainable development

Procedia PDF Downloads 276
411 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks

Authors: Sungchul Ha, Hyunwoo Kim

Abstract:

In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.

Keywords: MANETs, IDS, power control, minimum spanning tree

Procedia PDF Downloads 372
410 Combined Safety and Cybersecurity Risk Assessment for Intelligent Distributed Grids

Authors: Anders Thorsén, Behrooz Sangchoolie, Peter Folkesson, Ted Strandberg

Abstract:

As more parts of the power grid become connected to the internet, the risk of cyberattacks increases. To identify the cybersecurity threats and subsequently reduce vulnerabilities, the common practice is to carry out a cybersecurity risk assessment. For safety classified systems and products, there is also a need for safety risk assessments in addition to the cybersecurity risk assessment in order to identify and reduce safety risks. These two risk assessments are usually done separately, but since cybersecurity and functional safety are often related, a more comprehensive method covering both aspects is needed. Some work addressing this has been done for specific domains like the automotive domain, but more general methods suitable for, e.g., intelligent distributed grids, are still missing. One such method from the automotive domain is the Security-Aware Hazard Analysis and Risk Assessment (SAHARA) method that combines safety and cybersecurity risk assessments. This paper presents an approach where the SAHARA method has been modified in order to be more suitable for larger distributed systems. The adapted SAHARA method has a more general risk assessment approach than the original SAHARA. The proposed method has been successfully applied on two use cases of an intelligent distributed grid.

Keywords: intelligent distribution grids, threat analysis, risk assessment, safety, cybersecurity

Procedia PDF Downloads 153
409 Cybersecurity Assessment of Decentralized Autonomous Organizations in Smart Cities

Authors: Claire Biasco, Thaier Hayajneh

Abstract:

A smart city is the integration of digital technologies in urban environments to enhance the quality of life. Smart cities capture real-time information from devices, sensors, and network data to analyze and improve city functions such as traffic analysis, public safety, and environmental impacts. Current smart cities face controversy due to their reliance on real-time data tracking and surveillance. Internet of Things (IoT) devices and blockchain technology are converging to reshape smart city infrastructure away from its centralized model. Connecting IoT data to blockchain applications would create a peer-to-peer, decentralized model. Furthermore, blockchain technology powers the ability for IoT device data to shift from the ownership and control of centralized entities to individuals or communities with Decentralized Autonomous Organizations (DAOs). In the context of smart cities, DAOs can govern cyber-physical systems to have a greater influence over how urban services are being provided. This paper will explore how the core components of a smart city now apply to DAOs. We will also analyze different definitions of DAOs to determine their most important aspects in relation to smart cities. Both categorizations will provide a solid foundation to conduct a cybersecurity assessment of DAOs in smart cities. It will identify the benefits and risks of adopting DAOs as they currently operate. The paper will then provide several mitigation methods to combat cybersecurity risks of DAO integrations. Finally, we will give several insights into what challenges will be faced by DAO and blockchain spaces in the coming years before achieving a higher level of maturity.

Keywords: blockchain, IoT, smart city, DAO

Procedia PDF Downloads 121
408 Moroccan Human Ecological Behavior: Grounded Theory Approach

Authors: Dalal Tarfaoui, Salah Zkim

Abstract:

Today, environmental sustainability is everyone’s concern as it contributes in many aspects to a country's development. Morocco is also aware of the increasing threats to its natural resources. Accordingly, many projects and research have been discussed pointing mainly to water security, pollution, desertification, and land degradation, but few studies bothered to dig into the human demeanor to disclose its ecological behavior. Human behavior is accountable for environment deterioration in the first place, but we keep fighting the symptoms instead of limiting the root causes. In the conceptual framework highlighted in the present article, semi-structured interviews have been conducted using a grounded theory approach. Initially this study will serve as a pilot study and a cornerstone to approve a bigger project now in progress. Beyond the existing general ecological measures (GEM), this study has chosen the grounded theory approach to bring out firsthand insights, and probe to which extent an ecological dimension exists in Morocco as a developing country. The discourse of the ecological behavior within the Moroccan context is seen in more realist, social, and community philosophy. The study has revealed an appreciative ecological behavior that is unfortunately repressed by variables beyond people’s control, which would prevent the people’s environmental good intentions to be translated into real ecological actions.

Keywords: ecological behavior, ecological dimension, variables beyond people’s control, Morocco

Procedia PDF Downloads 495
407 Information Technology and Occupational Safety and Health

Authors: Muhammad Afiq Anaqi Bin Baharudin, Muhammad Izamuddin Bin Mohd Nasir, Syarifuddin Bin Sujuanda, Muhammad Syahmi Rusyaidi Bin Sham Suddin, Danish Hakimi Bin Kamaruzaman, Muhammad Haqimi Nazim Bin Hasmanizam, Mohammad Akmal Zakwan Bin Amran, Muhammad Alparizi Bin Latif

Abstract:

By improving efficiency and production, information technology (IT) has transformed working environments, but it has also created new threats to occupational safety and health (OSH). This study evaluates the literature that has already been written on the subject of IT and OSH, identifies major findings and discussion points, and highlights gaps in the material that call for additional research. The study's findings, which look at how IT affects OSH in a sizable multinational organization, are also presented in the report. According to the report, IT poses a number of OSH problems, such as ergonomic dangers, eye strain, dangers related to cybersecurity, and psychological hazards. The report suggests using tactics like providing comfortable workstations, encouraging a healthy balance between work and life, and putting strong cybersecurity safeguards in place to reduce these dangers. The implications of these findings for OSH and IT are discussed in the paper's conclusion, and it emphasizes the need for more study and action to address these dangers and promote healthy and secure working environments in the age of digitization.

Keywords: information technology, occupational safety and health (OSH), ergonomic, hazards, workplace.

Procedia PDF Downloads 128
406 Higher Language Education in Australia: Uncovering Language Positioning

Authors: Mobina Sahraee Juybari

Abstract:

There are around 300 languages spoken in Australia, and more than one-fifth of the population speaks a language other than English at home. The presence of international students in schools raises this number still further. Although the multilingual and multicultural status of Australia has been acknowledged by the government in education policy, the strong focus on English in institutional settings threatens the maintenance and learning of other languages. This is particularly true of universities’ language provisions. To cope with the financial impact of Covid-19, the government has cut funding for a number of Asian languages, such as Indonesian, Japanese and Chinese. This issue threats the maintenance of other languages in Australia and leaves students unprepared for the future job market. By taking account of the current reality of Australia’s diverse cultural and lingual makeup, this research intends to uncover the positioning of languages by having a historical look at Australia’s language policy and examining the value of languages and the probable impact of Covid-19 on the place of languages taught in Australian universities. A qualitative study will be adopted with language program tutors and course coordinators, with semi-structured interviews and government language policy analysis. This research hopes to provide insights into both the maintenance and learning of international language programs in tertiary language education in Australia and more widely.

Keywords: Australia, COVID-19, higher education sector, language maintenance, language and culture diversity

Procedia PDF Downloads 105
405 Baseline Study on Human Trafficking Crimes: A Case Study of Mapping Human Trafficking Crimes in East Java Province, Indonesia

Authors: Ni Komang Desy Arya Pinatih

Abstract:

Transnational crime is a crime with 'unique' feature because the activities benefit the lack of state monitoring on the borders so dealing with it cannot be based on conventional engagement but also need joint operation with other countries. On the other hand with the flow of globalization and the growth of information technology and transportation, states become more vulnerable to transnational crime threats especially human trafficking. This paper would examine transnational crime activities, especially human trafficking in Indonesia. With the case study on the mapping of human trafficking crime in East Java province, Indonesia, this paper would try to analyze how the difference in human trafficking crime trends at the national and sub-national levels. The findings of this research were first, there is difference in human trafficking crime trends whereas at the national level the trend is rising, while at sub-national (province) level the trend is declining. Second, regarding the decline of human trafficking number, it’s interesting to see how the method to decrease human trafficking crime in East Jawa Province in order to reduce transnational crime accounts in the region. These things are hopefully becoming a model for transnational crimes engagement in other regions to reduce human trafficking numbers as much as possible.

Keywords: transnational crime, human trafficking, southeast Asia, anticipation model on transnational crimes

Procedia PDF Downloads 304
404 Bhumastra “Unmanned Ground Vehicle”

Authors: Vivek Krishna, Nikhil Jain, A. Mary Posonia A., Albert Mayan J

Abstract:

Terrorism and insurgency are significant global issues that require constant attention and effort from governments and scientists worldwide. To combat these threats, nations invest billions of dollars in developing new defensive technologies to protect civilians. Breakthroughs in vehicle automation have led to the use of sophisticated machines for many dangerous and critical anti-terrorist activities. Our concept of an "Unmanned Ground Vehicle" can carry out tasks such as border security, surveillance, mine detection, and active combat independently or in tandem with human control. The robot's movement can be wirelessly controlled by a person in a distant location or can travel to a pre-programmed destination autonomously in situations where personal control is not feasible. Our defence system comprises two units: the control unit that regulates mobility and the motion tracking unit. The remote operator robot uses the camera's live visual feed to manually operate both units, and the rover can automatically detect movement. The rover is operated by manpower who controls it using a joystick or mouse, and a wireless modem enables a soldier in a combat zone to control the rover via an additional controller feature.

Keywords: robotics, computer vision, Machine learning, Artificial intelligence, future of AI

Procedia PDF Downloads 123
403 Analyzing Environmental Emotive Triggers in Terrorist Propaganda

Authors: Travis Morris

Abstract:

The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.

Keywords: propaganda analysis, emotive triggers environmental security, frames

Procedia PDF Downloads 138
402 The Effectiveness of Cathodic Protection on Microbiologically Influenced Corrosion Control

Authors: S. Taghavi Kalajahi, A. Koerdt, T. Lund Skovhus

Abstract:

Cathodic protection (CP) is an electrochemical method to control and manage corrosion in different industries and environments. CP which is widely used, especially in buried and sub-merged environments, which both environments are susceptible to microbiologically influenced corrosion (MIC). Most of the standards recommend performing CP using -800 mV, however, if MIC threats are high or sulfate reducing bacteria (SRB) is present, the recommendation is to use more negative potentials for adequate protection of the metal. Due to the lack of knowledge and research on the effectiveness of CP on MIC, to the author’s best knowledge, there is no information about what MIC threat is and how much more negative potentials should be used enabling adequate protection and not overprotection (due to hydrogen embrittlement risk). Recently, the development and cheaper price of molecular microbial methods (MMMs) open the door for more effective investigations on the corrosion in the presence of microorganisms, along with other electrochemical methods and surface analysis. In this work, using MMMs, the gene expression of SRB biofilm under different potentials of CP will be investigated. The specific genes, such as pH buffering, metal oxidizing, etc., will be compared at different potentials, enabling to determine the precise potential that protect the metal effectively from SRB. This work is the initial step to be able to standardize the recommended potential under MIC condition, resulting better protection for the infrastructures.

Keywords: cathodic protection, microbiologically influenced corrosion, molecular microbial methods, sulfate reducing bacteria

Procedia PDF Downloads 92
401 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation

Authors: Rizwan Rizwan

Abstract:

This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.

Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats

Procedia PDF Downloads 30
400 Microbial Diversity Assessment in Household Point-of-Use Water Sources Using Spectroscopic Approach

Authors: Syahidah N. Zulkifli, Herlina A. Rahim, Nurul A. M. Subha

Abstract:

Sustaining water quality is critical in order to avoid any harmful health consequences for end-user consumers. The detection of microbial impurities at the household level is the foundation of water security. Water quality is now monitored only at water utilities or infrastructure, such as water treatment facilities or reservoirs. This research provides a first-hand scientific understanding of microbial composition presence in Malaysia’s household point-of-use (POUs) water supply influenced by seasonal fluctuations, standstill periods, and flow dynamics by using the NIR-Raman spectroscopic technique. According to the findings, 20% of water samples were contaminated by pathogenic bacteria, which are Legionella and Salmonella cells. A comparison of the spectra reveals significant signature peaks (420 cm⁻¹ to 1800 cm⁻¹), including species-specific bands. This demonstrates the importance of regularly monitoring POUs water quality to provide a safe and clean water supply to homeowners. Conventional Raman spectroscopy, up-to-date, is no longer suited for real-time monitoring. Therefore, this study introduced an alternative micro-spectrometer to give a rapid and sustainable way of monitoring POUs water quality. Assessing microbiological threats in water supply becomes more reliable and efficient by leveraging IoT protocol.

Keywords: microbial contaminants, water quality, water monitoring, Raman spectroscopy

Procedia PDF Downloads 110
399 Regulation on the Protection of Personal Data Versus Quality Data Assurance in the Healthcare System Case Report

Authors: Elizabeta Krstić Vukelja

Abstract:

Digitization of personal data is a consequence of the development of information and communication technologies that create a new work environment with many advantages and challenges, but also potential threats to privacy and personal data protection. Regulation (EU) 2016/679 of the European Parliament and of the Council is becoming a law and obligation that should address the issues of personal data protection and information security. The existence of the Regulation leads to the conclusion that national legislation in the field of virtual environment, protection of the rights of EU citizens and processing of their personal data is insufficiently effective. In the health system, special emphasis is placed on the processing of special categories of personal data, such as health data. The healthcare industry is recognized as a particularly sensitive area in which a large amount of medical data is processed, the digitization of which enables quick access and quick identification of the health insured. The protection of the individual requires quality IT solutions that guarantee the technical protection of personal categories. However, the real problems are the technical and human nature and the spatial limitations of the application of the Regulation. Some conclusions will be drawn by analyzing the implementation of the basic principles of the Regulation on the example of the Croatian health care system and comparing it with similar activities in other EU member states.

Keywords: regulation, healthcare system, personal dana protection, quality data assurance

Procedia PDF Downloads 38
398 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 260
397 An Informetrics Analysis of Research on Phishing in Scopus and Web of Science Databases from 2012 to 2021

Authors: Nkosingiphile Mbusozayo Zungu

Abstract:

The purpose of the current study is to adopt informetrics methods to analyse the research on phishing from 2012 to 2021 in three selected databases in order to contribute to global cybersecurity through impactful research. The study follows a quantitative research methodology. We opted for the positivist epistemology and objectivist ontology. The analysis focuses on: (i) the productivity of individual authors, institutions, and countries; (ii) the research contributions, using co-authorship as a measure of collaboration; (iii) the altmetrics of selected research contributions; (iv) the citation patterns and research impact of research on phishing; and (v) research contributions by keywords, to discover the concepts that are related to phishing. The preliminary findings favour developed countries in terms of quantity and quality of research in the domain. There are unique research trends and patterns in the developing countries, including those in Africa, that provide opportunities for research development in the domain in the region. This study explores an important research domain by using unexplored method in the region. The study supports the SDG Agenda 2030, such as ending abuse, exploitation, trafficking, and all other forms of violence and torture of children through the use of cyberspace (SDG 16). Further, the results from this study can inform research, teaching, and learning largely in Africa. Invariably, the study contributes to cybersecurity awareness that will mitigate cybersecurity threats against vulnerable communities.

Keywords: phishing, cybersecurity, informetrics, information security

Procedia PDF Downloads 113
396 Impact of Global Climate Change on Economy of Pakistan: How to Ensure Sustainable Food and Energy Production

Authors: Sabahat Zahra

Abstract:

The purpose of this research is to present the changing global environment and its potential impacts on sustainable food and energy production at global level, particularly in Pakistan. The food and energy related-economic sector has been subjected to negative consequences due to recent extreme changes in weather conditions, particularly in developing countries. Besides continuous modifications in weather, population is also increasing by time, therefore it is necessary to take special steps and start effective initiatives to cope with the challenges of food and energy security to fight hunger and for economic stability of country. Severe increase in temperature and heat waves has also negative impacts on food production as well as energy sustainability. Energy (in terms of electricity) consumption has grown up than the production potential of the country as a consequence of increasing warm weather. Ultimately prices gone up when there is more consumption than production. Therefore, all these aspects of climate change are interrelated with socio-economic issues. There is a need to develop long-term policies on regional and national levels for maintainable economic growth. This research presents a framework-plan and recommendations for implementation needed to mitigate the potential threats due to global climate change sustainable food and energy production under climate change in the country.

Keywords: climate changes, energy security, food security, global climate change

Procedia PDF Downloads 350
395 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa

Authors: Kenneth Azaigba

Abstract:

The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.

Keywords: Africa, conflicts, pattern, war

Procedia PDF Downloads 387
394 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 191
393 Potential Use of Spore-Forming Biosurfactant Producing Bacteria in Oil-Pollution Bioremediation

Authors: S. N. Al-Bahry, Y. M. Al-Wahaibi, S. J. Joshi, E. A. Elshafie, A. S. Al-Bimani

Abstract:

Oman is one of the oil producing countries in the Arabian Peninsula and the Gulf region. About 30-40 % of oil produced from the Gulf is transported globally along the seacoast of Oman. Oil pollution from normal tanker operations, ballast water, illegal discharges and accidental spills are always serious threats to terrestrial and marine habitats. Due to Oman’s geographical location at arid region where the temperature ranges between high 40s and low 50s Celsius in summers with low annual rainfall, the main source of fresh water is desalinated sea and brackish water. Oil pollution, therefore, pose a major threat to drinking water. Biosurfactants are secondary metabolites produced by microorganisms in hydrophobic environments to release nutrients from solid surfaces, such as oil. In this study, indigenous oil degrading thermophilic spore forming bacteria were isolated from oil fields contaminated soil. The isolates were identified using MALDI-TOF biotyper and 16s RNA. Their growth conditions were optimized for the production of biosurfactant. Surface tension, interfacial tensions and microbial oil biodegradation capabilities were tested. Some thermophilic bacteria degraded either completely or partially heavy crude oil (API 10-15) within 48h suggesting their high potential in oil spill bioremediation and avoiding the commonly used physical and chemical methods which usually lead to other environmental pollution.

Keywords: bacteria, bioremediation, biosurfactant, crude-oil-pollution

Procedia PDF Downloads 427
392 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan

Authors: Pema Choejey, David Murray, Chun Che Fung

Abstract:

Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.

Keywords: awareness and training, cybersecurity policy, risk management, security risks

Procedia PDF Downloads 345
391 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 278
390 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances

Authors: Tydra Preyear, Victor Clincy

Abstract:

Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.

Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy

Procedia PDF Downloads 25
389 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review

Authors: Awad A. Younis, Elise Stronberg, Shifa Noor

Abstract:

Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.

Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review

Procedia PDF Downloads 230
388 Performance Analysis of Traffic Classification with Machine Learning

Authors: Htay Htay Yi, Zin May Aye

Abstract:

Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.

Keywords: false negative rate, intrusion detection system, machine learning methods, performance

Procedia PDF Downloads 118
387 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 60
386 Design of a Customized Freshly-Made Fruit Salad and Juices Vending Machine

Authors: María Laura Guevara Campos

Abstract:

The increasing number of vending machines makes it easy for people to find them more frequently in stores, universities, workplaces, and even hospitals. These machines usually offer products with high contents of sugar and fat, which, if consumed regularly, can result in serious health threats, as overweight and obesity. Additionally, the energy consumption of these machines tends to be high, which has an impact on the environment as well. In order to promote the consumption of healthy food, a vending machine was designed to give the customer the opportunity to choose between a customized fruit salad and a customized fruit juice, both of them prepared instantly with the ingredients selected by the customer. The main parameters considered to design the machine were: the storage of the preferred fruits in a salad and/or in a juice according to a survey, the size of the machine, the use of ecologic recipients, and the overall energy consumption. The methodology used for the design was the one proposed by the German Association of Engineers for mechatronics systems, which breaks the design process in several stages, from the elaboration of a list of requirements through the establishment of the working principles and the design concepts to the final design of the machine, which was done in a 3D modelling software. Finally, with the design of this machine, the aim is to contribute to the development and implementation of healthier vending machines that offer freshly-made products, which is not being widely attended at present.

Keywords: design, design methodology, mechatronics systems, vending machines

Procedia PDF Downloads 133
385 Exploring the Influence of Wind on Wildfire Behavior in China: A Data-Driven Study Using Machine Learning and Remote Sensing

Authors: Rida Kanwal, Wang Yuhui, Song Weiguo

Abstract:

Wildfires are one of the most prominent threats to ecosystems, human health, and economic activities, with wind acting as a critical driving factor. This study combines machine learning (ML) and remote sensing (RS) to assess the effects of wind on wildfires in Chongqing Province from August 16-23, 2022. Landsat 8 satellite images were used to estimate the difference normalized burn ratio (dNBR), representing prefire and postfire vegetation conditions. Wind data was analyzed through geographic information system (GIS) mapping. Correlation analysis between wind speed and fire radiative power (FRP) revealed a significant relationship. An autoregressive integrated moving average (ARIMA) model was developed for wind forecasting, and linear regression was applied to determine the effect of wind speed on FRP. The results identified high wind speed as a key factor contributing to the surge in FRP. Wind-rose plots showed winds blowing to the northwest (NW), aligning with the wildfire spread. This model was further validated with data from other provinces across China. This study integrated ML, RS, and GIS to analyze wildfire behavior, providing effective strategies for prediction and management.

Keywords: wildfires, machine learning, remote sensing, wind speed, GIS, wildfire behavior

Procedia PDF Downloads 20
384 Reducing Environmental Impact of Olive Oil Production in Sakaka City Using Combined Chemical, Physical, and Biological Treatment

Authors: Abdullah Alhajoj, Bassam Alowaiesh

Abstract:

This work aims to reduce the risks of discharging olive mill waste directly to the environment without treatment in Sakaka City, KSA. The organic loads expressed by chemical oxygen demand (COD) and biological oxygen demand (BOD) of the produced wastewater (OMWW) as well as the solid waste (OMW) were evaluated. The wastes emitted from the three-phase centrifuge decanters was found to be higher than that emitted from the two-phase centrifuge decanters. The olive mill wastewater (OMWW) was treated using advanced oxidation combined with filtration treatment. The results indicated that the concentration of COD, BOD, TSS, oil and grease and phenol was reduced by using complex sand filtration from 72150, 21660 10256, 36430, and 1470 mg/l to 980, 421, 58, 68, and 0.35 mg/l for three-phase OMWW and from 150562, 17955, 15325, 19658 and 2153 mg/l to 1050, 501, 29, 0.75, and 0.29 mg/l, respectively. While, by using modified trickling filter (packed with the neck of waste plastic bottles the concentration of the previously mentioned parameters was reduced to 1190, 570, 55, 0.85, and 0.3 mg/l, respectively. This work supports the application of such treatment technique for reducing the environmental threats of olive mill waste effluents in Saudi Arabia.

Keywords: two-phase, three-phase, olive mill, olive oil, waste treatment, filtration, advanced oxidation, waste plastic bottles

Procedia PDF Downloads 153